Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Using data mining techniques to explore security issues in smart living environments in Twitter

Published: 01 November 2021 Publication History

Abstract

In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However, the continuously generated data accumulated by these connected devices create security issues and raise user’s privacy concerns. The present study aims to explore the main security issues in smart living environments using data mining techniques. To this end, we applied a three-sentence data mining analysis of 9,38,258 tweets collected from Twitter under the user-generated data (UGD) framework. First, sentiment analysis was applied using Textblob which was tested with support vector classifier, multinomial naïve bayes, logistic regression, and random forest classifier; as a result, the analyzed tweets were divided into those expressing positive, negative, and neutral sentiment. Next, a Latent Dirichlet Allocation (LDA) algorithm was applied to divide the sample into topics related to security issues in smart living environments. Finally, the insights were extracted by applying a textual analysis process in Python validated with the analysis of frequency and weighted percentage variables and calculating the statistical measure known as mutual information (MI) to analyze the identified n-grams (unigrams and bigrams). As a result of the research 10 topics were identified in which we found that the main security issues are malware, cybersecurity attacks, data storing vulnerabilities, the use of testing software in IoT, and possible leaks due to the lack of user experience. We discussed different circumstances and causes that may affect user security and privacy when using IoT devices and emphasized the importance of UGC in the processing of personal data of IoT device users.

References

[1]
Seydoux N., Drira K., Hernandez N., Monteil T., IoT-O, a core-domain IoT ontology to represent connected devices networks, in: European Knowledge Acquisition Workshop, Springer, Cham, 2016, pp. 561–576,.
[2]
Ribeiro-Navarrete S., Saura J.R., Palacios-Marqués D., Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy, Technol. Forecast. Soc. Change 167 (2021),.
[3]
Kraus S., Roig-Tierno N., Bouncken R.B., Digital innovation and venturing: An introduction into the digitalization of entrepreneurship, Rev. Manag. Sci. 13 (3) (2019) 519–528.
[4]
Sahoo S.R., Gupta B.B., Multiple features based approach for automatic fake news detection on social networks using deep learning, Appl. Soft Comput. 100 (2021),.
[5]
Sivaraman V., Gharakheili H.H., Fernandes C., Clark N., Karliychuk T., Smart IoT devices in the home: Security and privacy implications, IEEE Technol. Soc. Mag. 37 (2) (2018) 71–79,.
[6]
Bouncken R., Qiu Y., The impact of digitalization on organizations - A review of the empirical literature, Int. J. Entrepreneurial Ventur. 2021 (2021),.
[7]
F. Kawsar, A.B. Brush, Home computing unplugged: why, where and when people use different connected devices at home, in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, September, pp. 627–636.
[8]
Alladi T., Chamola V., Sikdar B., Choo K.K.R., Consumer IoT: Security vulnerability case studies and solutions, IEEE Consum. Electron. Mag. 9 (2) (2020) 17–25,.
[9]
Seydoux N., Drira K., Hernandez N., Monteil T., IoT-O, a core-domain IoT ontology to represent connected devices networks, in: European Knowledge Acquisition Workshop, Springer, Cham, 2016, pp. 561–576,.
[10]
Bouncken R., Barwinski R., Shared digital identity and rich knowledge ties in global 3D printing - A drizzle in the clouds?, Glob. Strategy J. (2020) 1–28,.
[11]
Nzabahimana J.P., Analysis of security and privacy challenges in Internet of Things, in: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT, IEEE, 2018, pp. 175–178,.
[12]
Saura J.R., Using data sciences in digital marketing: Framework, methods, and performance metrics, J. Innov. Knowl. 6 (2) (2021) 92–102,. April–June 2021.
[13]
Medaglia C.M., Serbanati A., An overview of privacy and security issues in the internet of things, Internet Things 38 (2010) 9–395,.
[14]
Zainuddin N., Daud M., Ahmad S., Maslizan M., Abdullah S.A.L., A study on privacy issues in internet of things (IoT), in: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy, CSP, IEEE, 2021, pp. 96–100.
[15]
Tawalbeh L.A., Muheidat F., Tawalbeh M., Quwaider M., IoT privacy and security: Challenges and solutions, Appl. Sci. 10 (12) (2020) 4102,.
[16]
Esposito C., Ficco M., Gupta B.B., Blockchain-based authentication and authorization for smart city applications, Inf. Process. Manage. 58 (2) (2021),.
[17]
Nugent C.D., Hong X., Hallberg J., Finlay D., Synnes K., Assessing the impact of individual sensor reliability within smart living environments, in: 2008 IEEE International Conference on Automation Science and Engineering, IEEE, 2008, pp. 685–690,.
[18]
Blythe J.M., Sombatruang N., Johnson S.D., What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?, J. Cybersecur. 5 (1) (2019),. tyz005.
[19]
Ullah M., Nardelli P.H., Wolff A., Smolander K., Twenty-one key factors to choose an iot platform: Theoretical framework and its applications, IEEE Internet Things J. 7 (10) (2020) 10111–10119,.
[20]
Zhang Z.K., Cho M.C.Y., Wang C.W., Hsu C.W., Chen C.K., Shieh S., IoT security: ongoing challenges and research opportunities, in: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, IEEE, 2014, pp. 230–234.
[21]
Ammirato S., Sofo F., Felicetti A.M., Raso C., A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context, Eur. J. Innov. Manag. (2019),.
[22]
Patel K.K., Patel S.M., Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges, Int. J. Eng. Sci. Comput. 6 (5) (2016).
[23]
Bouncken R., Kraus S., Entrepreneurial ecosystems in an interconnected world: Emergence, governance, and digitalization, Rev. Manag. Sci. (2021),.
[24]
Hosseinian-Far A., Ramachandran M., Slack C.L., Emerging trends in cloud computing, big data, fog computing, IoT and smart living, in: Technology for Smart Futures, Springer, Cham, 2018, pp. 29–40,.
[25]
Lin H., Bergmann N.W., IoT privacy and security challenges for smart home environments, Information 7 (3) (2016) 44,.
[26]
Chow R., The last mile for IoT privacy, IEEE Secur. Priv. 15 (6) (2017) 73–76,.
[27]
Sicari S., Rizzardi A., Grieco L.A., Coen-Porisini A., Security, privacy and trust in Internet of Things: The road ahead, Comput. Netw. 76 (2015) 146–164,.
[28]
Caron X., Bosua R., Maynard S.B., Ahmad A., The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective, Comput. Law Secur. Rev. 32 (1) (2016) 4–15,.
[29]
Jayaraman P.P., Yang X., Yavari A., Georgakopoulos D., Yi X., Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation, Future Gener. Comput. Syst. 76 (2017) 540–549,.
[30]
Ma M., Wang P., Chu C.H., Data management for internet of things: Challenges, approaches and opportunities, in: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, IEEE, 2013, pp. 1144–1151.
[31]
Gupta S., Gupta B.B., XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud, Multimedia Tools Appl. 77 (4) (2018) 4829–4861,.
[32]
Hassan M.U., Rehmani M.H., Chen J., Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions, Future Gener. Comput. Syst. 97 (2019) 512–529,.
[33]
Liu Y.N., Wang Y.P., Wang X.F., Xia Z., Xu J.F., Privacy-preserving raw data collection without a trusted authority for IoT, Comput. Netw. 148 (2019) 340–348,.
[34]
Gill S.S., Garraghan P., Buyya R., ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices, J. Syst. Softw. 154 (2019) 125–138,.
[35]
Gupta B.B., Quamara M., An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols, Concurr. Comput.: Pract. Exper. 32 (21) (2020),.
[36]
Chaudhuri A., Internet of things data protection and privacy in the era of the General Data Protection Regulation, J. Data Protect. Priv. 1 (1) (2016) 64–75.
[37]
Tao H., Bhuiyan M.Z.A., Rahman M.A., Wang G., Wang T., Ahmed M.M., Li J., Economic perspective analysis of protecting big data security and privacy, Future Gener. Comput. Syst. 98 (2019) 660–671,.
[38]
Kim J.H., A survey of IoT security: Risks, requirements, trends, and key technologies, J. Ind. Integr. Manag. 2 (02) (2017),.
[39]
Santoso F.K., Vun N.C., Securing IoT for smart home system, in: 2015 International Symposium on Consumer Electronics, ISCE, IEEE, 2015, pp. 1–2,.
[40]
Hui S., Wang Z., Hou X., Wang X., Wang H., Li Y., Jin D., Systematically quantifying IoT privacy leakage in mobile networks, IEEE Internet Things J. (2020),.
[41]
Yu S., Wang G., Liu X., Niu J., Security and privacy in the age of the smart internet of things: An overview from a networking perspective, IEEE Commun. Mag. 56 (9) (2018) 14–18,.
[42]
Geneiatakis D., Kounelis I., Neisse R., Nai-Fovino I., Steri G., Baldini G., Security and privacy issues for an IoT based smart home, in: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO, IEEE, 2017, pp. 1292–1297,.
[43]
Arachchige P.C.M., Bertok P., Khalil I., Liu D., Camtepe S., Atiquzzaman M., A trustworthy privacy preserving framework for machine learning in industrial iot systems, IEEE Trans. Ind. Inf. 16 (9) (2020) 6092–6102,.
[44]
Hussain F., Hussain R., Hassan S.A., Hossain E., Machine learning in IoT security: current solutions and future challenges, IEEE Commun. Surv. Tutor. (2020),.
[45]
Zheng M., Xu D., Jiang L., Gu C., Tan R., Cheng P., Challenges of privacy-preserving machine learning in iot, in: Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, 2019, pp. 1–7,.
[46]
Porambage P., Ylianttila M., Schmitt C., Kumar P., Gurtov A., Vasilakos A.V., The quest for privacy in the internet of things, IEEE Cloud Comput. 3 (2) (2016) 36–45,.
[47]
Short J.C., Broberg J.C., Cogliser C.C., Brigham K.H., Construct validation using computer-aided text analysis (CATA) an illustration using entrepreneurial orientation, Organ. Res. Methods 13 (2) (2010) 320–347,.
[48]
Täuscher K., Bouncken R., Pesch R., Gaining legitimacy by being different: Optimal distinctiveness in crowdfunding platforms, Acad. Manag. J. (2020),. in press.
[49]
Kim D., Park K., Park Y., Ahn J.H., Willingness to provide personal information: Perspective of privacy calculus in IoT services, Comput. Hum. Behav. 92 (2019) 273–281,.
[50]
Grover Purva, Kar Arpan Kumar, Dwivedi Yogesh K., Janssen Marijn, Polarization and acculturation in US election 2016 outcomes – Can Twitter analytics predict changes in voting preferences, Technol. Forecast. Soc. Change 145 (2019) 438–460,.
[51]
A. Alamsyah, W. Rizkika, D.D.A. Nugroho, F. Renaldi, S. Saadah, Dynamic large scale data on twitter using sentiment analysis and topic modeling, in: 2018 6th International Conference on Information and Communication Technology, ICoICT, 2018, pp. 254–258.
[52]
Sarlan A., Nadam C., Basri S., Twitter sentiment analysis, in: Proceedings of the 6th International Conference on Information Technology and Multimedia, 2014, pp. 212–216,.
[53]
Saura J.R., Palacios-Marqués D., Iturricha-Fernández A., Ethical Design in Social Media: Assessing the main performance measurements of user online behavior modification, J. Bus. Res. 129 (2021) 271–281,.
[54]
Alam Muhammad, Abid Fazeel, Guangpei Cong, Yunrong L.V., Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications, Comput. Commun. 154 (2020) 129–137,.
[55]
Webberley William M., Allen Stuart M., Whitaker Roger M., Retweeting beyond expectation: Inferring interestingness in Twitter, Comput. Commun. 73 (2016) 229–235,.
[56]
Emami-Naeini Pardis, Bhagavatula Sruti, Habib Hana, Degeling Martin, Bauer Lujo, Cranor Lorrie Faith, Sadeh Norman, Privacy expectations and preferences in an IoT world, 15, 2020.
[57]
Yamazaki K., Ueda R., Nozawa S., Kojima M., Okada K., Matsumoto K., Ishikawa M., Shimoyama I., Inaba M., Home-assistant robot for an aging society, Proc. IEEE 100 (8) (2012) 2429–2441,.
[58]
Das A., Degeling M., Sadeh N., Personalized privacy assistants for the internet of things: Providing users with notice and choice, IEEE Pervasive Comput. 17 (3) (2018) 35–46,.
[59]
Roman R., Najera P., Lopez J., Securing the internet of things, Computer 44 (9) (2011) 51–58,.
[60]
Alrawi Omar, Lever Chaz, Antonakakis Manos, Monrose Fabian, SoK: Security evaluation of home-based IoT deployments, in: 2019 IEEE Symposium on Security and Privacy, SP, IEEE, San Francisco, CA, USA, 2019, pp. 1362–1380.
[61]
Hu Hang, Yang Limin, Lin Shihan, Wang Gang, A case study of the security vetting process of smart-home assistant applications, in: IEEE Security and Privacy Workshops, SPW, 2020, p. 6,.
[62]
Zhang K., Ni J., Yang K., Liang X., Ren J., Shen X.S., Security and privacy in smart city applications: Challenges and solutions, IEEE Commun. Mag. 55 (1) (2017) 122–129,.
[63]
Zhang Z., Sun R., Zhao C., Wang J., Chang C.K., Gupta B.B., Cyvod: a novel trinity multimedia social network scheme, Multimedia Tools Appl. 76 (18) (2017) 18513–18529,.
[64]
Saura J.R., Ribeiro-Soriano D., Palacios-Marqués D., Setting B2B Digital Marketing in Artificial Intelligence-based CRMs: A review and directions for future research, Industrial Marketing Management 98 (2021) 161–178,.
[65]
Parra Denis, Trattner Christoph, Gómez Diego, Hurtado Matías, Wen Xidao, Lin Yu-Ru, Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 computer science conferences, Comput. Commun. 73 (2016) 301–314,.
[66]
Mishra Prerna, Rajnish Ranjana, Kumar Pankaj, Sentiment analysis of Twitter data: Case study on digital India, in: 2016 International Conference on Information Technology (InCITe) - the Next Generation IT Summit on the Theme - Internet of Things: Connect Your Worlds, IEEE, Noida, 2016, pp. 148–153.
[67]
K.L. Liu, W.J. Li, M. Guo, Emoticon smoothed language models for twitter sentiment analysis, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 26, No. 1, 2012, July.
[68]
Janssen Marijn, Luthra Sunil, Mangla Sachin, Rana Nripendra P., Dwivedi Yogesh K., Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach, Internet Res. 29 (6) (2019) 1589–1616,.
[69]
Komninos N., Philippou E., Pitsillides A., Survey in smart grid and smart home security: Issues, challenges and countermeasures, IEEE Commun. Surv. Tutor. 16 (4) (2014) 1933–1954,.
[70]
Pecorella Tommaso, Pierucci Laura, Nizzi Francesca, Network sentiment framework to improve security and privacy for smart home, Future Internet 10 (12) (2018) 125,.
[71]
Pollach I., Taming textual data: The contribution of corpus linguistics to computer-aided text analysis, Organ. Res. Methods 15 (2) (2012) 263–287,.
[72]
McKenny A.F., Aguinis H., Short J.C., Anglin A.H., What doesn’t get measured does exist: Improving the accuracy of computer-aided text analysis, J. Manag. 44 (7) (2018) 2909–2933,.
[73]
Xuanyang X., Yuchang G., Shouhong W., Xi L., Computer aided detection of SARS based on radiographs data mining, in: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference, IEEE, 2006, pp. 7459–7462,.
[74]
Leon N., The future of computer-aided innovation, Comput. Ind. 60 (8) (2009) 539–550,.
[75]
Krippendorff K., Reliability in content analysis: Some common misconceptions and recommendations, Hum. Commun. Res. 30 (3) (2004) 411–433,.
[76]
Ribeiro F.N., Araújo M., Gonçalves P., Gonçalves M.A., Benevenuto F., Sentibench-a benchmark comparison of state-of-the-practice sentiment analysis methods, EPJ Data Sci. 5 (1) (2016) 1–29,.
[77]
Vijayarani S., Janani R., Text mining: open-source tokenization tools-an analysis, Adv. Comput. Intell. Int. J. 3 (1) (2016) 37–47.
[78]
Jelodar H., Wang Y., Yuan C., Feng X., Jiang X., Li Y., Zhao L., Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey, Multimedia Tools Appl. 78 (11) (2019) 15169–15211,.
[79]
Rana T.A., Cheah Y.N., Letchmunan S., Topic modeling in sentiment analysis: A systematic review, J. ICT Res. Appl. 10 (1) (2016),.
[80]
Krippendorff K., Content Analysis: An Introduction to Its Methodology, Sage Publications, 2018,.
[81]
M. De Choudhury, Y.R. Lin, H. Sundaram, K.S. Candan, L. Xie, A. Kelliher, How does the data sampling strategy impact the discovery of information diffusion in social media? in: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4, No. 1, 2010.
[82]
Hirschberg J., Manning C.D., Advances in natural language processing, Science 349 (6245) (2015) 261–266,.
[83]
Bhavsar H., Manglani R., Sentiment analysis of Twitter data using Python, Int. Res. J. Eng. Technol. 6 (3) (2019) 510–527.
[84]
Saura, Bennett, A three-stage method for data text mining: Using UGC in business intelligence analysis, Symmetry 11 (4) (2019) 519,.
[85]
Hiremath B.N., Patil M.M., Enhancing optimized personalized therapy in clinical decision support system using natural language processing, J. King Saud Univ.-Comput. Inf. Sci. (2020),.
[86]
Hardeniya N., Perkins J., Chopra D., Joshi N., Mathur I., Natural Language Processing: Python and NLTK, Packt Publishing Ltd, 2016.
[87]
Wilson T., Wiebe J., Hoffmann P., Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis, Comput. Linguist. 35 (3) (2009) 399–433,.
[88]
Wilson T., Wiebe J., Hoffmann P., Recognizing contextual polarity in phrase-level sentiment analysis, in: Proceedings of human language technology conference and conference on empirical methods in natural language processing, 2005, pp. 347–354,.
[89]
Sarkar D., Markovski S., Gusev M., Tomp D., Muravyov S., Filchenkov A., Parundekar A., Elias S., Ashok A., Sujitparapitaya S., Shirani A., Roldan M., Bonta V., Kumaresh N., Janardhan N., Mishra S., Pappu A., Bhamidipati N., He L., Zheng K., Bandi A., Fellah A., Inferring advertiser sentiment in online articles using Wikipedia footnotes, Adv. Intell. Syst. Comput. 2 (2019) 1224–1231,.
[90]
Griol D., Molina J.M., Callejas Z., Combining speech-based and linguistic classifiers to recognize emotion in user spoken utterances, Neurocomputing (2017) 1–9,.
[91]
Karoui J., Zitoune F.B., Moriceau V., SOUKHRIA: towards an irony detection system for arabic in social media, Procedia Comput. Sci. 117 (2017) 161–168,.
[92]
AlSumait L., Barbará D., Gentle J., Domeniconi C., Topic significance ranking of LDA generative models, in: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, Berlin, Heidelberg, 2009, pp. 67–82.
[93]
Agrawal A., Fu W., Menzies T., What is wrong with topic modeling? And how to fix it using search-based software engineering, Inf. Softw. Technol. 98 (2018) 74–88,.
[94]
Chen Y., Zhang H., Liu R., Ye Z., Lin J., Experimental explorations on short text topic mining between LDA and NMF based schemes, Knowl.-Based Syst. 163 (2019) 1–13,.
[95]
Blei D.M., Ng A.Y., Jordan M.I., Latent dirichlet allocation, J. Mach. Learn. Res. 3 (Jan) (2003) 993–1022.
[96]
Khan Z., Iltaf N., Afzal H., Abbas H., DST-HRS: A topic driven hybrid recommender system based on deep semantics, Comput. Commun. (2020),.
[97]
Loughran T., McDonald B., Textual analysis in accounting and finance: A survey, J. Account. Res. 54 (4) (2016) 1187–1230,.
[98]
Pandey S., Pandey S.K., Applying natural language processing capabilities in computerized textual analysis to measure organizational culture, Organ. Res. Methods 22 (3) (2019) 765–797,.
[99]
Qi W., Procter R., Zhang J., Guo W., Mapping consumer sentiment toward wireless services using geospatial twitter data, IEEE Access 7 (2019),.
[100]
Reyes-Menendez A., Saura J.R., Stephen B.T., Exploring key indicators of social identity in the #metoo era: Using discourse analysis in UGC, Int. J. Inf. Manage. 54 (2020),.
[101]
M.W. Wu, K.Y. Su, Corpus-based automatic compound extraction with mutual information and relative frequency count, in: Proceedings of Rocling VI Computational Linguistics Conference VI, 1993, pp. 207–216.
[102]
G. Bouma, Normalized (pointwise) mutual information in collocation extraction, in: Proceedings of GSCL, 2009, pp. 31–40.
[103]
Iyengar S., Sood G., Lelkes Y., Affect, not ideologya social identity perspective on polarization, Public Opin. Q. 76 (3) (2012) 405–431,.
[104]
Hoffman M., Bach F., Blei D., Online learning for latent dirichlet allocation, Adv. Neural Inf. Process. Syst. 23 (2010) 856–864.
[105]
Rayson P., Garside R., Comparing corpora using frequency profiling, in: The Workshop on Comparing Corpora, 2000, pp. 1–6,.
[106]
Biber D., If you look at …: Lexical bundles in university teaching and textbooks, Appl. Linguist. 25 (3) (2004) 371–405,.
[107]
McEnery T., Hardie A., The history of corpus linguistics, in: The Oxford Handbook of the History of Linguistics, Vol. 727, 2013, p. 745,.
[108]
Zhou W., Jia Y., Peng A., Zhang Y., Liu P., The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J. 6 (2) (2018) 1606–1616,.
[109]
Kong W., Qiao F., Wu Q., Real-manufacturing-oriented big data analysis and data value evaluation with domain knowledge, Comput. Statist. 35 (2) (2020) 515–538,.
[110]
Kumar J.S., Patel D.R., A survey on internet of things: Security and privacy issues, Int. J. Comput. Appl. 90 (11) (2014),.
[111]
Mohammad S.M., Security and privacy concerns of the ‘Internet of Things’(IoT) in IT and its help in the various sectors across the world, Int. J. Comput. Trends Technol. 68 (4) (2020) Available at SSRN: https://ssrn.com/abstract=3630513.
[112]
Arabo A., Brown I., El-Moussa F., Privacy in the age of mobility and smart devices in smart homes, in: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, IEEE, 2012, pp. 819–826.
[113]
Bugeja J., Jacobsson A., Davidsson P., On privacy and security challenges in smart connected homes, in: 2016 European Intelligence and Security Informatics Conference, EISIC, IEEE, 2016, pp. 172–175,.
[114]
Cai H., Xu B., Jiang L., Vasilakos A.V., IoT-based big data storage systems in cloud computing: perspectives and challenges, IEEE Internet Things J. 4 (1) (2016) 75–87,.
[115]
Radanliev P., De Roure D.C., Nicolescu R., Huth M., Montalvo R.M., Cannady S., Burnap P., Future developments in cyber risk assessment for the internet of things, Comput. Ind. 102 (2018) 14–22,.
[116]
Patel C., Doshi N., Security challenges in IoT cyber world, in: Security in Smart Cities: Models, Applications, and Challenges, Springer, Cham, 2019, pp. 171–191,.
[117]
Mahalle P.N., Anggorojati B., Prasad N.R., Prasad R., Identity authentication and capability-based access control (iacac) for the internet of things, J. Cyber Secur. Mobil. (2012) 309–348.
[118]
Sedjelmaci H., Senouci S.M., Taleb T., An accurate security game for low-resource IoT devices, IEEE Trans. Veh. Technol. 66 (10) (2017) 9381–9393,.
[119]
Popereshnyak S., Suprun O., Suprun O., Wieckowski T., Iot application testing features based on the modelling network, in: IoT Application Testing Features Based on the Modelling Network. in 2018 XIV-Th International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH, IEEE, 2018, pp. 127–131,.
[120]
Salamone F., Belussi L., Currò C., Danza L., Ghellere M., Guazzi G., et al., Integrated method for personal thermal comfort assessment and optimization through users’ feedback, IoT and machine learning: a case study, Sensors 18 (5) (2018) 1602,.
[121]
Amanullah M.A., Habeeb R.A.A., Nasaruddin F.H., Gani A., Ahmed E., Nainar A.S.M., et al., Deep learning and big data technologies for IoT security, Comput. Commun. 151 (2020) 495–517,.
[122]
Lee H., Kobsa A., Confident privacy decision-making in IoT environments, ACM Trans. Comput.-Hum. Interact. 27 (1) (2019) 1–39,.
[123]
Madaan N., Ahad M.A., Sastry S.M., Data integration in IoT ecosystem: Information linkage as a privacy threat, Comput. Law Secur. Rev. 34 (1) (2018) 125–133,.
[124]
Ishmaev G., The ethical limits of blockchain-enabled markets for private IoT data, Philos. Technol. 33 (3) (2020) 411–432,.
[125]
Farahani B., Firouzi F., Chang V., Badaroglu M., Constant N., Mankodiya K., Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare, Future Gener. Comput. Syst. 78 (2018) 659–676,.
[126]
Khemissa H., Tandjaoui D., A lightweight authentication scheme for E-health applications in the context of internet of things, in: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, IEEE, 2015, pp. 90–95.
[127]
Vilela P.H., Rodrigues J.J., Solic P., Saleem K., Furtado V., Performance evaluation of a Fog-assisted IoT solution for e-Health applications, Future Gener. Comput. Syst. 97 (2019) 379–386,.

Cited By

View all
  • (2023)Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environmentJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00356-912:1Online publication date: 23-Jan-2023
  • (2023)#A11yDev: Understanding Contemporary Software Accessibility Practices from Twitter ConversationsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581455(1-18)Online publication date: 19-Apr-2023
  • (2023)Artificial intelligence for cybersecurityInformation Fusion10.1016/j.inffus.2023.10180497:COnline publication date: 1-Sep-2023
  • Show More Cited By

Index Terms

  1. Using data mining techniques to explore security issues in smart living environments in Twitter
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Computer Communications
              Computer Communications  Volume 179, Issue C
              Nov 2021
              319 pages

              Publisher

              Elsevier Science Publishers B. V.

              Netherlands

              Publication History

              Published: 01 November 2021

              Author Tags

              1. Home assistant
              2. IoT
              3. Sentiment analysis
              4. Data mining
              5. Twitter
              6. UGC

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 27 Feb 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2023)Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environmentJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00356-912:1Online publication date: 23-Jan-2023
              • (2023)#A11yDev: Understanding Contemporary Software Accessibility Practices from Twitter ConversationsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581455(1-18)Online publication date: 19-Apr-2023
              • (2023)Artificial intelligence for cybersecurityInformation Fusion10.1016/j.inffus.2023.10180497:COnline publication date: 1-Sep-2023
              • (2023)Perspectives of non-expert users on cyber security and privacyComputers and Security10.1016/j.cose.2022.103008125:COnline publication date: 1-Feb-2023
              • (2023)Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on TwitterSecurity and Privacy in Social Networks and Big Data10.1007/978-981-99-5177-2_8(129-148)Online publication date: 14-Aug-2023
              • (2022)Leveraging email marketingExpert Systems with Applications: An International Journal10.1016/j.eswa.2022.117974207:COnline publication date: 30-Nov-2022
              • (2022)An Exploratory Study on Utilising the Web of Linked Data for Product Data MiningSN Computer Science10.1007/s42979-022-01415-34:1Online publication date: 17-Oct-2022

              View Options

              View options

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media